Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-7559: CWE-94 Improper Control of Generation of Code ('Code Injection') in File Manager File Manager Pro

0
High
VulnerabilityCVE-2024-7559cvecve-2024-7559cwe-94
Published: Fri Aug 23 2024 (08/23/2024, 02:31:46 UTC)
Source: CVE Database V5
Vendor/Project: File Manager
Product: File Manager Pro

Description

CVE-2024-7559 is a high-severity vulnerability in the File Manager Pro WordPress plugin affecting all versions up to 8. 3. 7. It allows authenticated users with Subscriber-level access or higher to upload arbitrary files due to missing file type validation and capability checks in the mk_file_folder_manager AJAX action. This flaw can lead to remote code execution on the affected server without requiring user interaction. The vulnerability stems from improper control of code generation (CWE-94), enabling attackers to execute malicious code by uploading crafted files. Exploitation requires only low privileges but no UI interaction, making it relatively easy to exploit remotely. No known exploits are currently reported in the wild, but the high CVSS score of 8. 8 reflects the critical impact potential. Organizations using this plugin should prioritize patching or mitigating this vulnerability to prevent compromise of confidentiality, integrity, and availability of their WordPress sites.

AI-Powered Analysis

AILast updated: 02/26/2026, 03:42:25 UTC

Technical Analysis

CVE-2024-7559 is a critical vulnerability identified in the File Manager Pro plugin for WordPress, affecting all versions up to and including 8.3.7. The vulnerability arises from the mk_file_folder_manager AJAX action, which lacks proper validation of uploaded file types and fails to enforce capability checks. Consequently, authenticated users with as little as Subscriber-level privileges can upload arbitrary files to the server hosting the WordPress site. This improper control of code generation (classified under CWE-94) enables attackers to upload malicious scripts or executable files, potentially leading to remote code execution (RCE). The vulnerability does not require user interaction and can be exploited remotely over the network (AV:N), with low attack complexity (AC:L). The scope is unchanged (S:U), meaning the impact is confined to the vulnerable component but can affect the entire site. The CVSS v3.1 base score is 8.8, indicating high severity with high impact on confidentiality, integrity, and availability. Although no public exploits have been reported yet, the ease of exploitation and the widespread use of WordPress and this plugin make this a significant risk. The vulnerability highlights the importance of strict input validation and proper permission checks in web applications, especially those handling file uploads.

Potential Impact

The vulnerability allows attackers with minimal privileges to upload arbitrary files, which can lead to full remote code execution on the web server. This can compromise the confidentiality of sensitive data stored on the server, allow attackers to modify or delete data (integrity impact), and disrupt website availability through malicious payloads or server manipulation. Organizations relying on WordPress sites with the File Manager Pro plugin are at risk of site defacement, data breaches, malware distribution, and use of the compromised server as a pivot point for further attacks within their network. The attack requires only authenticated access at a low privilege level, increasing the risk from insider threats or compromised low-level accounts. The lack of known exploits in the wild does not diminish the urgency, as proof-of-concept exploits may emerge rapidly given the vulnerability's nature and high CVSS score.

Mitigation Recommendations

Immediate mitigation involves updating the File Manager Pro plugin to a version that addresses this vulnerability once released by the vendor. Until a patch is available, organizations should restrict access to the plugin’s AJAX actions by limiting user roles that can interact with it, ideally removing Subscriber-level users or restricting their capabilities. Implement web application firewall (WAF) rules to detect and block suspicious file upload attempts targeting the mk_file_folder_manager action. Disable or remove the File Manager Pro plugin if not essential. Conduct thorough audits of user accounts to identify and remove unnecessary or suspicious low-privilege accounts. Monitor server logs for unusual file uploads or execution attempts. Employ file integrity monitoring to detect unauthorized changes. Additionally, apply the principle of least privilege to WordPress user roles and ensure that file upload directories have appropriate permissions to prevent execution of uploaded files.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2024-08-06T14:09:23.803Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6c1ab7ef31ef0b55fee7

Added to database: 2/25/2026, 9:39:38 PM

Last enriched: 2/26/2026, 3:42:25 AM

Last updated: 2/26/2026, 8:05:17 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats